summaryrefslogtreecommitdiffstats
path: root/ipatests
diff options
context:
space:
mode:
authorOleg Fayans <ofayans@redhat.com>2016-09-21 13:58:03 +0200
committerDavid Kupka <dkupka@redhat.com>2016-09-22 15:20:42 +0200
commit24f218f4ebe203213eebede59ff79b89c657ee76 (patch)
tree4e1e71f94728ca37ac5cecabee4d96490e486115 /ipatests
parentd17d13d77a7c09cbc99c8bb0a3f7af3b72da8aca (diff)
downloadfreeipa-24f218f4ebe203213eebede59ff79b89c657ee76.tar.gz
freeipa-24f218f4ebe203213eebede59ff79b89c657ee76.tar.xz
freeipa-24f218f4ebe203213eebede59ff79b89c657ee76.zip
tests: Added necessary xfails
A number of tests fail due to known issues. Added xfails to acknowledge them Reviewed-By: David Kupka <dkupka@redhat.com>
Diffstat (limited to 'ipatests')
-rw-r--r--ipatests/test_integration/test_caless.py13
1 files changed, 13 insertions, 0 deletions
diff --git a/ipatests/test_integration/test_caless.py b/ipatests/test_integration/test_caless.py
index bbf1fef41..04d186a4a 100644
--- a/ipatests/test_integration/test_caless.py
+++ b/ipatests/test_integration/test_caless.py
@@ -370,6 +370,7 @@ class TestServerInstall(CALessBase):
'trust chain of the server certificate in server.p12 '
'contains 1 certificates, expected 2')
+ @pytest.mark.xfail(reason='Ticket N 6289')
@server_install_teardown
def test_ca_2_certs(self):
"IPA server install with CA PEM file with 2 certificates"
@@ -432,6 +433,7 @@ class TestServerInstall(CALessBase):
'ipa-server-install: error: You must specify '
'--dirsrv-pin with --dirsrv-cert-file')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
@server_install_teardown
def test_incorect_http_pin(self):
"IPA server install with incorrect HTTP PKCS#12 password"
@@ -443,6 +445,7 @@ class TestServerInstall(CALessBase):
result = self.install_server(http_pin='bad<pin>')
assert_error(result, 'incorrect password for pkcs#12 file server.p12')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
@server_install_teardown
def test_incorect_ds_pin(self):
"IPA server install with incorrect DS PKCS#12 password"
@@ -637,6 +640,7 @@ class TestServerInstall(CALessBase):
assert result.returncode == 0
self.verify_installation()
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
@server_install_teardown
def test_wildcard_http(self):
"IPA server install with wildcard HTTP certificate"
@@ -651,6 +655,7 @@ class TestServerInstall(CALessBase):
assert result.returncode == 0
self.verify_installation()
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
@server_install_teardown
def test_wildcard_ds(self):
"IPA server install with wildcard DS certificate"
@@ -805,6 +810,7 @@ class TestReplicaInstall(CALessBase):
dirsrv_pkcs12_exists=False)
assert_error(result, 'Failed to open does_not_exist')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
@replica_install_teardown
def test_incorect_http_pin(self):
"IPA replica install with incorrect HTTP PKCS#12 password"
@@ -815,6 +821,7 @@ class TestReplicaInstall(CALessBase):
assert result.returncode > 0
assert_error(result, 'incorrect password for pkcs#12 file replica.p12')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
@replica_install_teardown
def test_incorect_ds_pin(self):
"IPA replica install with incorrect DS PKCS#12 password"
@@ -1007,6 +1014,7 @@ class TestReplicaInstall(CALessBase):
self.verify_installation()
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
@replica_install_teardown
def test_wildcard_http(self):
"IPA replica install with wildcard HTTP certificate"
@@ -1023,6 +1031,7 @@ class TestReplicaInstall(CALessBase):
self.verify_installation()
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
@replica_install_teardown
def test_wildcard_ds(self):
"IPA replica install with wildcard DS certificate"
@@ -1300,6 +1309,7 @@ class TestCertinstall(CALessBase):
cert_exists=False)
assert_error(result, 'Failed to open does_not_exist')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
def test_incorect_http_pin(self):
"Install new HTTP certificate with incorrect PKCS#12 password"
@@ -1307,6 +1317,7 @@ class TestCertinstall(CALessBase):
assert_error(result,
'incorrect password for pkcs#12 file server.p12')
+ @pytest.mark.xfail(reason='freeipa ticket 5378')
def test_incorect_dirsrv_pin(self):
"Install new DS certificate with incorrect PKCS#12 password"
@@ -1427,12 +1438,14 @@ class TestCertinstall(CALessBase):
result = self.certinstall('d', 'ca1/server')
assert result.returncode == 0
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
def test_wildcard_http(self):
"Install new wildcard HTTP certificate"
result = self.certinstall('w', 'ca1/wildcard')
assert result.returncode == 0
+ @pytest.mark.xfail(reason='freeipa ticket 5603')
def test_wildcard_ds(self):
"Install new wildcard DS certificate"